Check out the latest events and activities from Connect Smart and our Partners.
03 August 2017
Craig Dore, Senior Identity Architect, Asia Pacific, RSA | 29 June 2017
In today’s business environment, there’s a rapid shift that has been underway for the last decade, one which embraces two themes: the shift to cloud and the shift to mobility. These two themes provide clear value when applied to corporate IT.
Kevin Wu, Principal Security Consultant, Quantum Security | 29 June 2017
Mobile devices have increasingly become an essential part of our everyday lives. Our phones are no longer just a device for making calls or sending text messages. We rely on them for wider communication, transaction, navigation, media, Internet, lifestyle applications and more. Quantum Security
Chris Chong – SafeStack | 26 May 2017
Phishing attacks continue to evolve and are becoming more complex, sophisticated and harder to detect. Attacks are also increasingly targeted at individuals and organisations with the intent of not only accessing your data and/or stealing your money, but also infecting your systems with malware.
Peter Plowman, Senior Manager, Fraud and Security and Nick Tucker, IT Risk and Security | 26 May 2017
Phishing can serve a purpose and be used for good. That is what Peter Plowman and Nick Tucker from Kiwibank suggest when phishing is used as part of an educational exercise within organisations.
Ryan Ko, Associate Professor within the Faculty of Computing and Mathematical Sciences, University of Waikato | 26 May 2017
Ryan Ko is an Associate Professor within the Faculty of Computing and Mathematical Sciences at the University of Waikato. Ryan is also the Director of the New Zealand Institute for Security and Crime Science, and Head of the Cyber Security Lab. He is a member of the Cyber Security Skills Taskforce,
Philip Whitmore, Partner – Cyber Security, KPMG | 28 April 2017
There’s a rising chorus of “cyber fatigue” permeating New Zealand organisations, as cyber security is starting to become understandably tiresome. This phenomenon arises at a time when avoiding negative PR is paramount for success. As IT professionals concede that a breach is no longer a matter of “i
Howard Broad | 28 April 2017
Howard Broad: Speech to NZ Law Society: Cyber Law Conference; Wellington 4 April 2017
Stay Smart Online | 26 April 2017